Deployment Guide
Encryption takes place in the background. The Local Management Console can be opened or closed. Either way, encryption
of files progresses. You can continue to use your computer as usual while it is encrypting.
15. When the scan is complete, the computer reboots once more.
Once all encryption sweeps and reboots are complete, you can verify compliance status by launching the Local Management
Console. The drive is labeled as "In Compliance".
Advanced Authentication and Encryption Personal Setup Wizards
25